Results for 'watermark'

5 found
Order:
  1. Proustian Habit.Thomas Stern - 2022 - In Anna Elsner & Thomas Stern (eds.), The Proustian Mind. New York, NY: Routledge. pp. 161-175.
    The reader of RTP is granted just a few paragraphs before habit is introduced: Habit! That able but slow-moving arranger who begins by letting our minds sufer for weeks on end in temporary quarters, but whom our mind is nonetheless only too happy to fnd, for without it, reduced to its own devices, it would be powerless to make any room habitable. (SW, 9, translation altered; I 8) Implied is a view of mind: powerless to interfere with habit’s course, but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Leibniz’s Argument for the Identity of Indiscernibles in his Letter to Casati.Gonzalo Rodriguez-Pereyra - 2012 - The Leibniz Review 22:137-150.
    Leibniz’s short letter to the mathematician and physicist Ludovico Casati of 1689 is a short but interesting text on the Principle of Identity of Indiscernibles, to which it is entirely dedicated. Since there is no watermark in the paper of the letter, the letter is difficult to date, but it is likely that it was written during Leibniz’s stay in Rome, sometime between April and November of 1689 (A 2 2 287–8). When addressing the letter, Leibniz wrote ‘Casani’, but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Biosemiotic and psychopathology of the ordo amoris. Biosemiotica e psicopatologia dell'ordo amoris. In dialogo con Max Scheler.Guido Cusinato - 2018 - Milano MI, Italia: FrancoAngeli.
    How comes that two organisms can interact with each other or that we can comprehend what the other experiences? The theories of embodiment, intersubjectivity or empathy have repeatedly taken as their starting point an individualistic assumption (the comprehension of the other comes after the self-comprehension) or a cognitivist one (the affective dimension follows the cognitive process). The thesis of this book is that there are no two isolated entities at the origin which successively interact with each other. There is, rather, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  16
    Digital Authentication for Wireless Domain Using Variable Marking of Multiple Secret Signatures and its Practical Implication in E-Stamp Authentication.Mohit Gangwar - 2024 - International Journal of Intelligent Systems and Applications in Engineering 12 (2):29-41.
    This work focuses on enhancing security for transmitted e-documents, such as e-stamp papers, within wireless environments through dynamic authentication using variable circular concealment of multiple invisible signature images. This method is driven by encrypted secret keys and session-based random numbers, alongside a region-specific bit casting strategy and dynamic bit sequencing for multiple signatures to bolster security and robustness. Multi-copy signature marking on non-overlapping document areas, coupled with varied bit encoding strategies for each modified pixel byte coefficient in cover image sub-blocks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Reasonable Retention.Mota Victor - manuscript
    Download  
     
    Export citation  
     
    Bookmark